In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0416 | In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser. |
Github GHSA |
GHSA-fmpq-w5q6-9vf9 | Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-main |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T17:44:15.405Z
Reserved: 2018-11-14T00:00:00
Link: CVE-2019-0224
No data.
Status : Modified
Published: 2019-03-28T21:29:00.243
Modified: 2024-11-21T04:16:31.940
Link: CVE-2019-0224
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA